Please use this identifier to cite or link to this item: https://er.chdtu.edu.ua/handle/ChSTU/4538
Full metadata record
DC FieldValueLanguage
dc.contributor.authorФауре, Еміль Віталійович-
dc.contributor.authorМахинько, Микола Вікторович-
dc.date.accessioned2023-09-26T11:54:52Z-
dc.date.available2023-09-26T11:54:52Z-
dc.date.issued2023-
dc.identifier.isbn979-8-218-22315-1-
dc.identifier.urihttps://er.chdtu.edu.ua/handle/ChSTU/4538-
dc.description.abstractThe report highlights approaches to construct error-correcting permutation code in the context of its use in integrated data protection systems against channel errors and unauthorized access based on nonseparable factorial coding. The use of affine and projective general linear groups to form an ensemble of permutations, in addition to providing a given code distance for permutation dictionaries (arrays), allows generating network and session keys during secure data exchange. The statistical approach to construct permutation code is based on enumerating permutations and selecting those permutations, which distance does not exceed a given value to all previously selected codewords.uk_UA
dc.language.isoukuk_UA
dc.publisherNGO Institute for Cyberspace Research (Detroit, Michigan, USA)uk_UA
dc.titleПідходи до побудови завадостійкого перестановочного коду для нероздільного факторіального кодування данихuk_UA
dc.typeBook chapteruk_UA
dc.citation.spage40uk_UA
dc.citation.epage42uk_UA
dc.title.bookChallenges and threats to critical infrastructure. Collective monographuk_UA
Appears in Collections:Наукові публікації викладачів (ФІТІС)

Files in This Item:
File Description SizeFormat 
Monograph-09-06-2023-Faure1.pdf1.09 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.